Cryptanalysis

Results: 756



#Item
701Cipher / Meet-in-the-middle attack / Key size / Triple DES / RSA / Block cipher / Cryptanalysis / Multiple encryption / Rabin cryptosystem / Cryptography / Public-key cryptography / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-20 06:17:58
702Linear cryptanalysis / Block cipher / ICE / Symmetric-key algorithm / Feistel cipher / Lucifer / Cipher / Index of cryptography articles / Weak key / Cryptography / Data Encryption Standard / Key schedule

PDF Document

Add to Reading List

Source URL: www.apprendre-en-ligne.net

Language: English - Date: 2006-09-25 10:23:56
703Lorenz cipher / Colossus computer / Enigma machine / Known-plaintext attack / Siemens and Halske T52 / Testery / Cryptanalysis of the Lorenz cipher / Banburismus / Cryptography / Espionage / Bletchley Park

PDF Document

Add to Reading List

Source URL: cryptocellar.web.cern.ch

Language: English - Date: 1998-12-16 10:50:50
704ICE / Boomerang attack / Cipher / Cryptanalysis / Differential cryptanalysis / Khufu and Khafre / Cryptography / Block cipher / Ciphertext

PDF Document

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2009-06-09 03:26:03
705Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / XTEA / ICE / SHACAL / International Data Encryption Algorithm / Advanced Encryption Standard / Differential cryptanalysis / Key schedule / Cryptography / Block ciphers / Data Encryption Standard

PDF Document

Add to Reading List

Source URL: jiqiang.googlepages.com

Language: English
706Stream ciphers / Differential cryptanalysis / MDS matrix / LEX / Grand Cru / Key schedule / Cipher / XSL attack / Data Encryption Standard / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-04-09 02:17:21
707SHA-2 / One-way compression function / Differential cryptanalysis / MD5 / SHACAL / Hash function / Preimage attack / Collision attack / Boomerang attack / Cryptography / Cryptographic hash functions / SHA-1

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-20 11:25:59
708Feistel cipher / Differential cryptanalysis / ICE / Block cipher / E2 / Key schedule / RC4 / Blowfish / Khufu and Khafre / Cryptography / Advanced Encryption Standard / Camellia

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-11-20 09:06:45
709Advanced Encryption Standard / E2 / Feistel cipher / Block cipher / Side channel attack / Cryptanalysis / Integral cryptanalysis / Tiny Encryption Algorithm / Timing attack / Cryptography / Camellia / ICE

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-14 10:15:59
710Key management / Differential cryptanalysis / Key schedule / Boomerang attack / Weak key / Related-key attack / ARIA / Q / Cryptography / Advanced Encryption Standard / Block ciphers

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 21:59:51
UPDATE